diff options
author | Khem Raj <raj.khem@gmail.com> | 2022-02-17 12:19:04 -0800 |
---|---|---|
committer | Khem Raj <raj.khem@gmail.com> | 2022-02-21 18:12:04 -0800 |
commit | f2df2701790374429264c8f40b75e48548d384e1 (patch) | |
tree | 49ba05606d3b34d73d22d1ad9a90aaf7a5b0122c /meta-networking | |
parent | 1d4b29aa87c5c1fa7bcda601b48d43d5c0ca7b10 (diff) | |
download | meta-openembedded-f2df2701790374429264c8f40b75e48548d384e1.tar.gz |
recipes: Use new CVE_CHECK_IGNORE variable
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Diffstat (limited to 'meta-networking')
6 files changed, 6 insertions, 6 deletions
diff --git a/meta-networking/recipes-connectivity/samba/samba_4.14.12.bb b/meta-networking/recipes-connectivity/samba/samba_4.14.12.bb index 5be4d2d51e..1fd30ad8af 100644 --- a/meta-networking/recipes-connectivity/samba/samba_4.14.12.bb +++ b/meta-networking/recipes-connectivity/samba/samba_4.14.12.bb @@ -38,7 +38,7 @@ UPSTREAM_CHECK_REGEX = "samba\-(?P<pver>4\.14(\.\d+)+).tar.gz" inherit systemd waf-samba cpan-base perlnative update-rc.d perl-version pkgconfig # CVE-2011-2411 is valnerble only on HP NonStop Servers. -CVE_CHECK_WHITELIST += "CVE-2011-2411" +CVE_CHECK_IGNORE += "CVE-2011-2411" # remove default added RDEPENDS on perl RDEPENDS:${PN}:remove = "perl" diff --git a/meta-networking/recipes-daemons/cyrus-sasl/cyrus-sasl_2.1.27.bb b/meta-networking/recipes-daemons/cyrus-sasl/cyrus-sasl_2.1.27.bb index 7a6243b10b..43b69f7a21 100644 --- a/meta-networking/recipes-daemons/cyrus-sasl/cyrus-sasl_2.1.27.bb +++ b/meta-networking/recipes-daemons/cyrus-sasl/cyrus-sasl_2.1.27.bb @@ -98,4 +98,4 @@ FILES:${PN}-staticdev += "${libdir}/sasl2/*.a" INSANE_SKIP:${PN} += "dev-so" # CVE-2020-8032 affects only openSUSE -CVE_CHECK_WHITELIST += "CVE-2020-8032" +CVE_CHECK_IGNORE += "CVE-2020-8032" diff --git a/meta-networking/recipes-protocols/mdns/mdns_1310.140.1.bb b/meta-networking/recipes-protocols/mdns/mdns_1310.140.1.bb index 5c6d220200..205dc929be 100644 --- a/meta-networking/recipes-protocols/mdns/mdns_1310.140.1.bb +++ b/meta-networking/recipes-protocols/mdns/mdns_1310.140.1.bb @@ -38,7 +38,7 @@ CVE_PRODUCT = "apple:mdnsresponder" # https://www.incibe-cert.es/en/early-warning/vulnerabilities/cve-2007-0613 # https://security-tracker.debian.org/tracker/CVE-2007-0613 # https://vulmon.com/vulnerabilitydetails?qid=CVE-2007-0613 -CVE_CHECK_WHITELIST += "CVE-2007-0613" +CVE_CHECK_IGNORE += "CVE-2007-0613" PARALLEL_MAKE = "" diff --git a/meta-networking/recipes-support/dovecot/dovecot_2.3.14.bb b/meta-networking/recipes-support/dovecot/dovecot_2.3.14.bb index 464f622502..1017f16add 100644 --- a/meta-networking/recipes-support/dovecot/dovecot_2.3.14.bb +++ b/meta-networking/recipes-support/dovecot/dovecot_2.3.14.bb @@ -74,4 +74,4 @@ FILES:${PN}-dev += "${libdir}/dovecot/libdovecot*.so" FILES:${PN}-dbg += "${libdir}/dovecot/*/.debug" # CVE-2016-4983 affects only postinstall script on specific distribution -CVE_CHECK_WHITELIST += "CVE-2016-4983" +CVE_CHECK_IGNORE += "CVE-2016-4983" diff --git a/meta-networking/recipes-support/ntp/ntp_4.2.8p15.bb b/meta-networking/recipes-support/ntp/ntp_4.2.8p15.bb index 4a719ae9c8..fe2bd0773c 100644 --- a/meta-networking/recipes-support/ntp/ntp_4.2.8p15.bb +++ b/meta-networking/recipes-support/ntp/ntp_4.2.8p15.bb @@ -29,7 +29,7 @@ SRC_URI = "http://www.eecis.udel.edu/~ntp/ntp_spool/ntp4/ntp-4.2/ntp-${PV}.tar.g SRC_URI[sha256sum] = "f65840deab68614d5d7ceb2d0bb9304ff70dcdedd09abb79754a87536b849c19" # CVE-2016-9312 is only for windows. -CVE_CHECK_WHITELIST += "CVE-2016-9312" +CVE_CHECK_IGNORE += "CVE-2016-9312" inherit autotools update-rc.d useradd systemd pkgconfig diff --git a/meta-networking/recipes-support/openvpn/openvpn_2.5.5.bb b/meta-networking/recipes-support/openvpn/openvpn_2.5.5.bb index 2dc3af6bf9..6c4514eb90 100644 --- a/meta-networking/recipes-support/openvpn/openvpn_2.5.5.bb +++ b/meta-networking/recipes-support/openvpn/openvpn_2.5.5.bb @@ -17,7 +17,7 @@ UPSTREAM_CHECK_URI = "https://openvpn.net/community-downloads" SRC_URI[sha256sum] = "7500df4734173bce2e95b5039079119dacaff121650b2b6ca76d2dc68bdac1c5" # CVE-2020-7224 and CVE-2020-27569 are for Aviatrix OpenVPN client, not for openvpn. -CVE_CHECK_WHITELIST += "CVE-2020-7224 CVE-2020-27569" +CVE_CHECK_IGNORE += "CVE-2020-7224 CVE-2020-27569" SYSTEMD_SERVICE:${PN} += "openvpn@loopback-server.service openvpn@loopback-client.service" SYSTEMD_AUTO_ENABLE = "disable" |